Versions of the package nemo-appium before 0.0.9 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports.setup' function.
**Note:** In order to exploit this vulnerability appium-running 0.1.3 has to be installed as one of nemo-appium dependencies.
References
Link | Resource |
---|---|
https://github.com/paypal/nemo-appium/blob/master/index.js%23L27 | Broken Link |
https://github.com/paypal/nemo-appium/commit/aa271d36dd5c81baae3c43aa2616c84f0ee4195f | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747 | Exploit Third Party Advisory |
https://github.com/paypal/nemo-appium/blob/master/index.js%23L27 | Broken Link |
https://github.com/paypal/nemo-appium/commit/aa271d36dd5c81baae3c43aa2616c84f0ee4195f | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747 | Exploit Third Party Advisory |
Configurations
History
27 Mar 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
Information
Published : 2023-01-31 05:15
Updated : 2025-03-27 18:15
NVD link : CVE-2022-21129
Mitre link : CVE-2022-21129
CVE.ORG link : CVE-2022-21129
JSON object : View
Products Affected
paypal
- nemo-appium
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NVD-CWE-Other CWE-77Improper Neutralization of Special Elements used in a Command ('Command Injection')